Date: Sat, 12 Dec 2015 10:55:10 +0100 From: Pierre Schweitzer <pierre@...ctos.org> To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org Subject: CVE request: Remote DoS in Quassel Dear all, It was discovered and fixed  in Quassel, a DoS remotely triggerable by any client on a Quassel core. Any client sending the command "/op *" in a query will cause the Quassel core to crash. I was able to reproduce it with Quassel 0.10.0. No release has this fix in yet. Can a CVE be assigned to this issue? Cheers, : https://github.com/quassel/quassel/commit/b8edbda019eeb99da8663193e224efc9d1265dc7 -- Pierre Schweitzer <pierre at reactos.org> System & Network Administrator Senior Kernel Developer ReactOS Deutschland e.V. Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.